Unit 1: IT Systems: Information Systems - System components - network components - Risk management - What is Risk - profile - identification -assessment -Analysis -Response -Tolerance - Risk types - inherent risk - control risk - audit risk. -Security risk analysis - Advantages
Unit 2: IT Assets: Assets management - Identify Assets - Asset classification - Asset valuation - Binary Asset Valuation -Rank-Based Asset Valuation - Consensus Asset Valuation - Classification-Based Asset Valuation - others
Unit 3: Cyber Threat: Threat management - Identifying Threats -Threat model - Threat attributes - Attack tree - STRIDE - DREAD - OCTAVE - CAPEC- Threat Statements- Technical Threats and Safeguards - Physical Threats and Safeguard - Human Threats to Physical Security -The RIIOT Method: Physical Data Gathering - Test Physical Security Safeguard.
Unit 4: Risk Assessment: Security Risk Assessment - Quantitative vs. Qualitative Analysis - Determining Risk - Creating Risk Statement - Security Risk Mitigation - Selecting Safeguard - Security Risk Assessment Reports - Report Structure.
Unit 5: Business Continuity: Principles of Business continuity - Business Interruption Events – Business impact assessment – fire exposure analysis – functional analysis –compliance issues – Pre-Planning - Initial Response - Recovery - Identification of Recovery environment - Identification of Recovery Point - site and structures – Equipment and technology – documents and records electronic equipment and process equipment - Business continuity plans – crisis management plans –function restoration plans – disaster recovery plans – Incident Response Plan